CN101043319A - Digital content protective system and method - Google Patents

Digital content protective system and method Download PDF

Info

Publication number
CN101043319A
CN101043319A CNA2006100600148A CN200610060014A CN101043319A CN 101043319 A CN101043319 A CN 101043319A CN A2006100600148 A CNA2006100600148 A CN A2006100600148A CN 200610060014 A CN200610060014 A CN 200610060014A CN 101043319 A CN101043319 A CN 101043319A
Authority
CN
China
Prior art keywords
document
user
plug
digital content
key pair
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006100600148A
Other languages
Chinese (zh)
Other versions
CN101043319B (en
Inventor
林柏全
胡高鹏
黄健
罗才洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CN2006100600148A priority Critical patent/CN101043319B/en
Priority to US11/565,650 priority patent/US20070226488A1/en
Publication of CN101043319A publication Critical patent/CN101043319A/en
Application granted granted Critical
Publication of CN101043319B publication Critical patent/CN101043319B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A protecting system and method for the digital content, the method includes following steps: create file and encrypt the file; create the user's authority table of the file; when the user extract the encrypted file, find and judge the user's operation authority of the file; if the user has the operation authority, decrypt the file, and allow the user to the operation; record the user's operation. Using the invention it can encrypt the electrical file automatically, judge the user's operation authority to protect the confidential paper of business.

Description

Digital content protective system and method
[technical field]
The present invention relates to a kind of digital content protective system and method.
[background technology]
Along with Internet development, digitized equipment and digitized information are used in daily life widely.People can download digitized image (image), music (audio), picture (graph) and film (video) etc. from network at an easy rate, the user also can duplicate and revise these digitized information easily, even after altering these digitlization information, declare it is the works of oneself, carry out coml and use, seek illegitimate benefits.This behavior grievous injury the proprietary intellectual property of data.Because the prosperity of internet, digitized multimedia information is easy to be duplicated mala fide and propagate like this under the situation without copyright owner's mandate excessively.So digitized multimedia information must possess the measure that protects the intellectual property, and could protect copyright owner's legitimate rights and interests.
Digital content protection comprises two aspects: the one, and the digital content of propagating on the protecting network is not illegally distorted, and the 2nd, provide effective protection to digital content, prevent from arbitrarily to be propagated.At present, copyrighted digital content protection and management are mainly adopted based on industry Open Mobile Alliance digital copyright management (Open Mobile Alliance Digital Rights Management, OMA DRM) standard techniques scheme.OMA DRM has defined the various copyrights of digital content and has used controlling models, and making of control figure content is used for protecting digital content effectively.The architectural framework of this technical scheme mainly comprises: digital content provides the digital copyright management proxy (DRM Agent) of door, digital content delivery system, digital rights management service device and user terminal, and wherein the digital rights management service device comprises digital content packing server (Packager Server) and copyright Distributor (Rights Issuer Server).Wherein digital content provides door to be used to provide digital content and copyright regulation management; Digital content delivery system is used for distribution procedure and the reference numerals content sender and the digital content recipient of control figure content; Digital content packing server is used for digital content is encrypted, and is packaged into the DRM message bag of standard; The copyright Distributor is responsible for sending the rights certificate of digital content; Digital copyright management proxy then is used for the rights certificate of resolution digital content and the copyright control of combine digital content.
, application number open on January 26th, 2005 is 03178580.8 Chinese patent application case, disclosed a kind of copyrighted digital content protection and management method and system.This method be by digital content delivery system to copyrighted digital content protection and the request of management system submission copyright control, whether described digital content delivery system determines distribute digital content according to copyright control result.But this method can only the control figure content transmission, uncontrollable user is to the use of digital content.
[summary of the invention]
In view of above content, be necessary to provide a kind of digital content protective system, it can be encrypted electronic document automatically, differentiates active user's rights of using, with the classified papers of protection enterprises.
In view of above content, also be necessary to provide a kind of digital content protection method, it can be encrypted electronic document automatically, differentiates active user's rights of using, with the classified papers of protection enterprises.
A kind of digital content protective system comprises the server and client side who links to each other by the network communication engine.Described server comprises: the document content unit is used to a newly-built document creation user right tabulation; The certificate unit is used for generating the use certificate of different user to the document according to above-mentioned user right tabulation.Described client comprises: identification module, be used to generate the encryption key pair of file encryption information header and document, and the document enciphered message head comprises the digital element identifier of a unique identification the document; Encrypting-decrypting module is used for according to this encryption key pair document being carried out encryption and decryption; Plug-in management module (Renderer ManagementModule, RM), be used for management and control identification module, encrypting-decrypting module and FTP client FTP plug-in unit, use credentials check user's authority according to the user, and judge whether this user has pair the document to carry out operation permission.
Described client also comprises: the local information notification module, and the information that is used between system plugin and the plug-in management module transmits; Network information notification module, the information that is used between plug-in management module and the network communication engine transmits.
A kind of digital content protection method comprises the steps: to create document and encrypts the document; Create the user right tabulation of the document; The user extracts this encrypted document, searches and judges that this user is to the document operation authority; If the user has operation authority, deciphering the document.
Described encrypted document may further comprise the steps: the file encryption information header and the encryption key pair that generate the document; Preserve the document enciphered message head and this encryption key pair; By this encryption key pair the document is encrypted, and added ciphertext retaining front at this and enclose the file encryption information header.
Described step is searched and is judged that this user may further comprise the steps the document operation authority: obtain the file encryption information header of the document, judge whether this user has the use certificate of the document; If do not have, then obtain the user right tabulation of the document according to the document enciphered message head; Generate the use certificate of this user according to this user right tabulation to the document; Judge this user's operation authority according to this use certificate.
Compared to prior art, described digital content protective system and method by electronic document being encrypted and being authorized, can be discerned user's authority automatically, have effectively prevented leaking of enterprises classified papers.Described digital content protective system and method can not need other permission system to login in conjunction with enterprise customer's account number, distinguish active user's identity automatically.
[description of drawings]
Fig. 1 is the system architecture diagram of digital content protective system preferred embodiment of the present invention.
Fig. 2 is the overall flow figure of digital content protection method preferred embodiment of the present invention.
Fig. 3 is the detail flowchart of the encrypted document step of digital content protection method of the present invention.
Fig. 4 is the detail flowchart of the searching user right step of digital content protection method of the present invention.
[embodiment]
As shown in Figure 1, be the system architecture diagram of digital content protective system preferred embodiment of the present invention.This system mainly comprises digital rights management service device 1, a plurality of digital copyright management clients 2 and network communication engine 3.
Described digital rights management service device 1 comprises document content unit 11, certificate unit 12 and log record/tracing unit 13.Wherein, document content unit 11 is used to a newly-built document to create user right in the user right tabulation and preserves these new document data, this user right list records the setting of different user to the document operating right, comprise reading, printing, modification etc., can find the rights of using of different user by this user right tabulation to the document, and can find the condition of use, comprise reading, printing, modification etc.; Certificate unit 12 is used for generating the use certificate of different user to the document according to above-mentioned user right tabulation, this user's use certificate school bag contains the rights of using of this user to the document, uses certificate can judge that can this user operate document according to this user; Log record/tracing unit 13 is used to preserve the user to operation that the document carried out.
Described digital copyright management client 2 comprises identification module 21, network information notification module 22, encrypting-decrypting module 23, plug-in management module 24, local information notification module 25 and a plurality of system plugin.Described system plugin comprises Office plug-in unit 26, Pro/E plug-in unit 27, PDF plug-in unit 28, other plug-in unit 29.Plug-in unit is a kind of separate procedure in the computer software, and it can not be carried out separately, must depend on certain software, reaches the effect that strengthens original software function.Wherein, also have a RM buffer memory in the plug-in management module 24, this RM buffer memory has plug-in management module 24 often and recently to use the data of being.
Wherein, identification module 21 is used to generate file encryption information header and encryption key pair, obtains the file encryption information header from document.The document enciphered message head includes the DOI sign of document, DOI (the Digital Object Identifier that the document enciphered message head is comprised, the digital element identifier) ISBN (International Standard Book Number) of similar books (International StandardBook Number, ISBN).This digital element identifier is a unique value, can document of unique identification with it.Such as, three computer: M1 are arranged, M2, M3, M1 have a document C: D1.doc, the digital element identifier of supposing document D 1 is Id1, when document D 1.doc be copied to M2 C: D2.doc, copied to from M2 again then M3 C: D3.doc, original document D1.Doc has just had two copies like this, but D1.doc, D2.doc, D3.doc are same documents, if but be whether can't discern these three parts of documents be same document only from filename, at this moment just need use its digital element identifier, and the digital element identifier of these three parts of documents all is Id1, so just can judge that according to this digital element identifier these three parts of documents are same documents.
Encrypting-decrypting module 23 is used for according to encryption key pair document being carried out encryption and decryption.In ciphering process, plug-in management module 24 is used to obtain file encryption information header and the encryption key pair that needs encrypted document, the document enciphered message head and this encryption key pair are sent to 11 preservations of document content unit, plug-in management module 24 confirms in the RM buffer memory whether this encryption key pair has been arranged then, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, carry out cryptographic calculation by 23 pairs of the document of encrypting-decrypting module and this encryption key pair, realize the encryption of document, the document enciphered message head is enclosed in the literary composition retaining front after encryption.
Described plug-in management module 24 also is used for when other users need visit an encrypted document, obtain the file encryption information header of this encrypted document, the document enciphered message hair is delivered to certificate unit 12, certificate unit 12 obtains the user right tabulation of this encrypted document according to the document enciphered message head, this user of inquiry is to the operating right of this encrypted document from the user right tabulation of this encrypted document, generate this user according to this user's operating right the use certificate of this encrypted document is returned to plug-in management module 24, plug-in management module 24 is according to this user's of use credentials check of this user authority, judge whether the user can operate encrypted document, and note the operation that this user carries out this encrypted document, record is sent to log record/tracing unit 13.
Described encrypting-decrypting module 23 also is used for when judging that described user has when this encrypted document carried out operation permission, is decrypted this encrypted document.Idiographic flow is as follows: plug-in management module 24 confirms whether this encryption key pair has been arranged in the RM buffer memory, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, is decrypted computing by 23 pairs of these encrypted document of encrypting-decrypting module and this encryption key pair, realizes the deciphering of document.
The information that network information notification module 22 is used between plug-in management module 24 and the network communication engine 3 transmits.The information that local information notification module 25 is used between said system plug-in unit and the plug-in management module 24 transmits.
Described network communication engine 3 is a kind of intermediate equipment of network communication, by this intermediate equipment, can realize the information interchange between digital rights management service device 1 and the digital copyright management client 2.Connection between described digital rights management service device 1 and the digital copyright management client 2 also can realize by network.
As described below, be by aforementioned digital content protective system, implement the step of this digital content protection.After what a new document was document creator create, and selects to encrypt the document, identification module 21 generated the file encryption information header and the encryption key pair of the document, and the document enciphered message head comprises a digital element identifier.In the present embodiment, ciphering process carries out in client.
Then, plug-in management module 24 is obtained the document enciphered message head and this encryption key pair, the document enciphered message head and this encryption key pair are sent to 11 preservations of document content unit, plug-in management module 24 confirms in the RM buffer memory whether this encryption key pair has been arranged then, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, carry out cryptographic calculation by 23 pairs of the document of encrypting-decrypting module and this encryption key pair, realize the encryption of document, enclose the document enciphered message head in this encrypted document front, in the user right tabulation, create user right for the document by document content unit 11 then.
After the another one user extracts and opens this encrypted document with this encrypted document, system plugin is by local information notification module 25 notice plug-in management modules 24, whether inquiry plug-in management module 24 allows this user to carry out this operation, if the file encryption information header of this encrypted document has been arranged in the RM buffer memory, then plug-in management module 24 will directly be obtained the file encryption information header of this encrypted document from the RM buffer memory.If the file encryption information header of this encrypted document not in the RM buffer memory, then plug-in management module 24 is obtained the file encryption information header by identification module 21 from this encrypted document.Then, plug-in management module 24 confirms whether to have in the RM buffer memory use certificate of the corresponding the document of this user again, if the use certificate of the corresponding the document of this user has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this use certificate from the RM buffer memory.If the use certificate of the corresponding the document of this user not in the RM buffer memory, plug-in management module 24 is sent to certificate unit 12 by network information notification module 22 with the document enciphered message head again, certificate unit 12 obtains the user right tabulation of the document from document content unit 11 according to the document enciphered message head, tabulation generates this user the use certificate of the document is returned to plug-in management module 24 according to this user right again, plug-in management module 24 judges according to this user's of use credentials check of this user operating right whether this user's operation is allowed to.If this user does not have operation authority, plug-in management module 24 notice Office plug-in units 26 stop this user's operation this time.If this user has operation authority, plug-in management module 24 confirms whether this encryption key pair has been arranged in the RM buffer memory, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, be decrypted computing by 23 pairs of these encrypted document of encrypting-decrypting module and this encryption key pair, realize the deciphering of document, allow this user to carry out operation this time.Simultaneously, plug-in management module 24 is got off this user's operation note this time, and record is sent to log record/tracing unit 13.
As shown in Figure 2, be the overall flow figure of digital content protection method preferred embodiment of the present invention.At first, the user starts documents editing program (as Microsoft Office), and Office plug-in unit 26 will be taken over all operations of document editor, and the user creates a new document (step S300).The user selects the document is saved as ciphertext then, Office plug-in unit 26 notice plug-in management modules 24 are encrypted the document, at this moment, identification module 21 generates the file encryption information header and the encryption key pair of the document, the document enciphered message head comprises a digital element identifier, plug-in management module 24 is obtained the document enciphered message head and this encryption key pair, the document enciphered message head and this encryption key pair are sent to 11 preservations of document content unit, plug-in management module 24 confirms in the RM buffer memory whether this encryption key pair has been arranged then, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, carry out cryptographic calculation by 23 pairs of the document of encrypting-decrypting module and this encryption key pair, realize the encryption of document, enclose under the document enciphered message head and the preservation in the retaining of the literary composition after encryption front, create the user right tabulation (step S301) of the document then by document content unit 11.
When the another one user extracts and open this encrypted document when reading (step S302) with this encrypted document, Office plug-in unit 26 these users of interception are to the operation of this encrypted document, whether inquiry plug-in management module 24 allows this user to carry out this operation, and plug-in management module 24 is obtained the document enciphered message head.Then, plug-in management module 24 is obtained the use certificate (step S303) of the corresponding the document of user again.Plug-in management module 24 judges that according to this user's of use credentials check of this user rights of using this user has or not operation authority (step S304).If this user does not have operation authority, plug-in management module 24 notice Office plug-in units 26 stop this user's operation (step S305) this time, if this user has operation authority, plug-in management module 24 confirms in the RM buffer memory whether this encryption key pair has been arranged, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, be decrypted computing by 23 pairs of these encrypted document of encrypting-decrypting module and this encryption key pair, realize the deciphering of document, allow this user to carry out operation (step S306) this time.Simultaneously, plug-in management module 24 is noted this user's operation this time, and record is sent to log record/tracing unit 13 (step S307).When carrying out other operation, this user (comprises all operations that documents editing/browser provides, such as Microsoft Word " saving as " operation), the operation note that can this user be carried out by identical flow process and by plug-in management module 24 is in log record/tracing unit 13.
As shown in Figure 3, be the detail flowchart of the encrypted document step of digital content protection method of the present invention.After user's selection is ciphertext with document storing, identification module 21 generates the file encryption information header and the encryption key pair of the document, Office plug-in unit 26 notice plug-in management modules 24 are encrypted (step S400) with the document, and plug-in management module 24 obtains the document enciphered message head and encryption key pair (step S401) by identification module 21.Plug-in management module 24 sends to 11 preservations (step S402) of document content unit with the document enciphered message head and this encryption key pair, judge whether the document enciphered message head and encryption key pair preserve success (step S403), if do not preserve successfully, then finish this operation.If preserve successfully, then plug-in management module 24 confirms whether this encryption key pair has been arranged in the RM buffer memory, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, carry out cryptographic calculation by 23 pairs of the document of encrypting-decrypting module and this encryption key pair, realize the encryption of document, and enclose the document enciphered message head (step S404) in this encrypted document front.
As shown in Figure 4, be the detail flowchart of the searching user right step of digital content protection method of the present invention.When other users extract this encrypted document when reading, at this moment Office plug-in unit 26 will be tackled the operation of this user to this encrypted document, and by local information notification module 25 notice plug-in management modules 24, whether inquiry plug-in management module 24 allows this user to carry out this operation (step S500).Plug-in management module 24 confirms whether to have had in the RM buffer memory file encryption information header (step S501) of this encrypted document, if the file encryption information header of this encrypted document has been arranged in the RM buffer memory, then plug-in management module 24 will directly be obtained the file encryption information header (step S502) of this encrypted document from the RM buffer memory.If the file encryption information header of this encrypted document not in the RM buffer memory, then plug-in management module 24 is obtained file encryption information header (step S503) by identification module 21 from this encrypted document.
Then, plug-in management module 24 confirms whether to have in the RM buffer memory use certificate (step S504) of the corresponding the document of this user again, if the use certificate of the corresponding the document of this user has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this use certificate (step S505) from the RM buffer memory.If the use certificate of the corresponding the document of this user not in the RM buffer memory, then plug-in management module 24 is given the network communication engine 3 by the file encryption information header that network information notification module 22 transmits the document, the network communication engine 3 sends the document enciphered message head to certificate unit 12 again, certificate unit 12 obtains this encrypted document according to the document enciphered message head from document content unit 11 user right tabulation, the use certificate that generates the corresponding the document of this user according to this user right tabulation returns to plug-in management module 24 (step S506) again.Plug-in management module 24 judges again according to this user's of use credentials check of this user operating right whether this user's operation this time is allowed to (step S507).

Claims (11)

1. digital content protective system comprises server, client and connects described server and client side's network communication engine, it is characterized in that described server comprises:
The document content unit is used to a newly-built document creation user right tabulation;
The certificate unit is used for generating the use certificate of different user to the document according to above-mentioned user right tabulation;
Described client comprises:
Identification module is used to generate the encryption key pair of file encryption information header and document, and the document enciphered message head comprises the digital element identifier of a unique identification the document;
Encrypting-decrypting module is used for according to this encryption key pair document being carried out encryption and decryption;
The plug-in management module is used for management and control identification module, encrypting-decrypting module and FTP client FTP plug-in unit, uses credentials check user's authority according to the user, and judges whether this user has pair the document to carry out operation permission.
2. digital content protective system as claimed in claim 1 is characterized in that, described plug-in management module is to transmit and the FTP client FTP plug-in unit is managed and controls by a local information notification module and the FTP client FTP plug-in unit information of carrying out.
3. digital content protective system as claimed in claim 1 is characterized in that, described plug-in management module is to transmit by a network information notification module and the network communication engine information of carrying out.
4. digital content protective system as claimed in claim 1 is characterized in that, when described plug-in management module judged that this user has the operating right of pair the document, the control encrypting-decrypting module utilized encryption key pair that encrypted document is decrypted.
5. digital content protective system as claimed in claim 1 is characterized in that, described server also comprises:
Log record/tracing unit is used to preserve the user to operation that document carried out.
6. digital content protective system as claimed in claim 5 is characterized in that, described plug-in management module also is used for:
Note the user to the operation that document carried out, and record is sent to log record/tracing unit preservation of server.
7. a digital content protection method is characterized in that, this method comprises the steps:
Create document and encrypt the document;
Create the user right tabulation of the document;
When the user extracts this encrypted document, search and judge that this user is to the document operation authority;
If the user has operation authority, deciphering the document.
8. digital content protection method as claimed in claim 7 is characterized in that described method also comprises the steps:
Note this user's associative operation.
9. digital content protection method as claimed in claim 7 is characterized in that, described encrypted document may further comprise the steps:
Generate the file encryption information header and the encryption key pair of the document;
Preserve the document enciphered message head and this encryption key pair;
By this encryption key pair the document is encrypted, and added ciphertext retaining front at this and enclose the file encryption information header.
10. digital content protection method as claimed in claim 7 is characterized in that, described step is searched and judged that this user comprises the document operation authority:
Obtain the file encryption information header of the document, judge whether this user has the use certificate of the document;
If do not have, then obtain the user right tabulation of the document according to the document enciphered message head;
Generate the use certificate of this user according to this user right tabulation to the document;
Judge this user's operation authority according to this use certificate.
11. digital content protection method as claimed in claim 7 is characterized in that, this method also comprises the steps:
If this user does not have operation authority, then stop this user's operation this time.
CN2006100600148A 2006-03-22 2006-03-22 Digital content protective system and method Expired - Fee Related CN101043319B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2006100600148A CN101043319B (en) 2006-03-22 2006-03-22 Digital content protective system and method
US11/565,650 US20070226488A1 (en) 2006-03-22 2006-12-01 System and method for protecting digital files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006100600148A CN101043319B (en) 2006-03-22 2006-03-22 Digital content protective system and method

Publications (2)

Publication Number Publication Date
CN101043319A true CN101043319A (en) 2007-09-26
CN101043319B CN101043319B (en) 2011-02-02

Family

ID=38566943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006100600148A Expired - Fee Related CN101043319B (en) 2006-03-22 2006-03-22 Digital content protective system and method

Country Status (2)

Country Link
US (1) US20070226488A1 (en)
CN (1) CN101043319B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677352A (en) * 2008-09-19 2010-03-24 富士施乐株式会社 Document management system, document producing apparatus, document use managing apparatus, and computer readable medium
CN101957895A (en) * 2009-07-17 2011-01-26 精品科技股份有限公司 External rights control management system of electronic record and method thereof
CN101960460A (en) * 2008-02-27 2011-01-26 微软公司 Secure file transmission and reputation are searched
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
CN102457503A (en) * 2010-10-29 2012-05-16 镇江雅迅软件有限责任公司 Secret key control device based on file authority management
CN102474530A (en) * 2009-08-19 2012-05-23 宝马股份公司 Method for configuring infotainment applications in motor vehicle
CN101741889B (en) * 2008-11-17 2012-07-11 北京易路联动技术有限公司 Method, system and service for centralized management of network services
CN101957893B (en) * 2009-07-15 2013-02-20 精品科技股份有限公司 File permission management system
CN105373961A (en) * 2015-10-30 2016-03-02 上海斐讯数据通信技术有限公司 Image modification method and device, and image management system
CN105790962A (en) * 2014-12-24 2016-07-20 华为技术有限公司 Conference document obtaining method, apparatus, and system
CN106453425A (en) * 2016-12-09 2017-02-22 郑州云海信息技术有限公司 Multiuser right management method and multiuser right management system for using host plugin
CN106503581A (en) * 2016-10-21 2017-03-15 珠海市魅族科技有限公司 A kind of documents editing processing method and processing device
CN106991035A (en) * 2017-04-06 2017-07-28 北京计算机技术及应用研究所 A kind of Host Supervision System based on micro services framework
CN111625854A (en) * 2020-05-25 2020-09-04 聚好看科技股份有限公司 Document encryption method, access method, server and system

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8274401B2 (en) * 2006-12-22 2012-09-25 Acterna Llc Secure data transfer in a communication system including portable meters
US20100217988A1 (en) * 2007-04-12 2010-08-26 Avow Systems, Inc. Electronic document management and delivery
US7900248B2 (en) * 2007-05-31 2011-03-01 Microsoft Corporation Access control negation using negative groups
US20080307486A1 (en) * 2007-06-11 2008-12-11 Microsoft Corporation Entity based access management
US8468579B2 (en) 2007-06-15 2013-06-18 Microsoft Corporation Transformation of sequential access control lists utilizing certificates
US8516602B2 (en) * 2008-04-25 2013-08-20 Nokia Corporation Methods, apparatuses, and computer program products for providing distributed access rights management using access rights filters
US8515996B2 (en) 2008-05-19 2013-08-20 Emulex Design & Manufacturing Corporation Secure configuration of authentication servers
US9081888B2 (en) 2010-03-31 2015-07-14 Cloudera, Inc. Collecting and aggregating log data with fault tolerance
US9082127B2 (en) 2010-03-31 2015-07-14 Cloudera, Inc. Collecting and aggregating datasets for analysis
US9317572B2 (en) 2010-03-31 2016-04-19 Cloudera, Inc. Configuring a system to collect and aggregate datasets
US8874526B2 (en) 2010-03-31 2014-10-28 Cloudera, Inc. Dynamically processing an event using an extensible data model
US8788815B1 (en) * 2011-01-31 2014-07-22 Gazzang, Inc. System and method for controlling access to decrypted data
US8880592B2 (en) 2011-03-31 2014-11-04 Cloudera, Inc. User interface implementation for partial display update
US9128949B2 (en) 2012-01-18 2015-09-08 Cloudera, Inc. Memory allocation buffer for reduction of heap fragmentation
US9172608B2 (en) 2012-02-07 2015-10-27 Cloudera, Inc. Centralized configuration and monitoring of a distributed computing cluster
US9405692B2 (en) 2012-03-21 2016-08-02 Cloudera, Inc. Data processing performance enhancement in a distributed file system
US9338008B1 (en) 2012-04-02 2016-05-10 Cloudera, Inc. System and method for secure release of secret information over a network
US9842126B2 (en) 2012-04-20 2017-12-12 Cloudera, Inc. Automatic repair of corrupt HBases
US9753954B2 (en) 2012-09-14 2017-09-05 Cloudera, Inc. Data node fencing in a distributed file system
US9342557B2 (en) 2013-03-13 2016-05-17 Cloudera, Inc. Low latency query engine for Apache Hadoop
CN104079532A (en) * 2013-03-26 2014-10-01 腾讯科技(深圳)有限公司 Online reading method and system, client and server
US9477731B2 (en) 2013-10-01 2016-10-25 Cloudera, Inc. Background format optimization for enhanced SQL-like queries in Hadoop
US9934382B2 (en) 2013-10-28 2018-04-03 Cloudera, Inc. Virtual machine image encryption
US9690671B2 (en) 2013-11-01 2017-06-27 Cloudera, Inc. Manifest-based snapshots in distributed computing environments
US10171635B2 (en) 2013-12-04 2019-01-01 Cloudera, Inc. Ensuring properly ordered events in a distributed computing environment
US9229674B2 (en) 2014-01-31 2016-01-05 Ebay Inc. 3D printing: marketplace with federated access to printers
CN105320893B (en) * 2014-07-30 2018-09-28 上海斐讯数据通信技术有限公司 A kind of data prevention method and system applied to mobile terminal
US9747333B2 (en) 2014-10-08 2017-08-29 Cloudera, Inc. Querying operating system state on multiple machines declaratively
US9595037B2 (en) 2014-12-16 2017-03-14 Ebay Inc. Digital rights and integrity management in three-dimensional (3D) printing
US20160167307A1 (en) * 2014-12-16 2016-06-16 Ebay Inc. Systems and methods for 3d digital printing
US9442808B1 (en) * 2014-12-30 2016-09-13 Emc Corporation Session tickets for a backup and recovery system
US10120904B2 (en) 2014-12-31 2018-11-06 Cloudera, Inc. Resource management in a distributed computing environment
US10068074B2 (en) 2016-03-25 2018-09-04 Credly, Inc. Generation, management, and tracking of digital credentials
US10033536B2 (en) 2016-03-25 2018-07-24 Credly, Inc. Generation, management, and tracking of digital credentials
US20190089692A1 (en) 2017-09-15 2019-03-21 Pearson Education, Inc. Time-based degradation of digital credentials in a digital credential platform
US10803104B2 (en) 2017-11-01 2020-10-13 Pearson Education, Inc. Digital credential field mapping

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7437550B2 (en) * 1999-12-02 2008-10-14 Ponoi Corp. System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
US7178021B1 (en) * 2000-03-02 2007-02-13 Sun Microsystems, Inc. Method and apparatus for using non-secure file servers for secure information storage
US7036011B2 (en) * 2000-06-29 2006-04-25 Cachestream Corporation Digital rights management
JP2003304243A (en) * 2002-04-12 2003-10-24 Mitsubishi Electric Information Systems Corp Electronic signature program
CN1485746A (en) * 2002-09-27 2004-03-31 鸿富锦精密工业(深圳)有限公司 Management system and method for user safety authority limit
WO2005036882A1 (en) * 2003-10-14 2005-04-21 Matsushita Electric Industrial Co., Ltd. Mpeg-21 digital content protection system
WO2005048056A2 (en) * 2003-11-06 2005-05-26 Live Cargo, Inc. Systems and methods for electronic information distribution
JP4081048B2 (en) * 2004-06-18 2008-04-23 株式会社東芝 Content protection method, apparatus and program
CN100361443C (en) * 2004-08-17 2008-01-09 迈普(四川)通信技术有限公司 Access control method and safety proxy server
US20060294366A1 (en) * 2005-06-23 2006-12-28 International Business Machines Corp. Method and system for establishing a secure connection based on an attribute certificate having user credentials

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101960460A (en) * 2008-02-27 2011-01-26 微软公司 Secure file transmission and reputation are searched
CN101677352B (en) * 2008-09-19 2014-04-02 富士施乐株式会社 Document management system, document producing apparatus, document use managing apparatus, and computer readable medium
CN101677352A (en) * 2008-09-19 2010-03-24 富士施乐株式会社 Document management system, document producing apparatus, document use managing apparatus, and computer readable medium
CN101741889B (en) * 2008-11-17 2012-07-11 北京易路联动技术有限公司 Method, system and service for centralized management of network services
CN101957893B (en) * 2009-07-15 2013-02-20 精品科技股份有限公司 File permission management system
CN101957895A (en) * 2009-07-17 2011-01-26 精品科技股份有限公司 External rights control management system of electronic record and method thereof
CN102474530A (en) * 2009-08-19 2012-05-23 宝马股份公司 Method for configuring infotainment applications in motor vehicle
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
CN102457503A (en) * 2010-10-29 2012-05-16 镇江雅迅软件有限责任公司 Secret key control device based on file authority management
CN105790962A (en) * 2014-12-24 2016-07-20 华为技术有限公司 Conference document obtaining method, apparatus, and system
CN105790962B (en) * 2014-12-24 2020-02-14 华为技术有限公司 Method, device and system for acquiring conference document
CN105373961A (en) * 2015-10-30 2016-03-02 上海斐讯数据通信技术有限公司 Image modification method and device, and image management system
CN106503581A (en) * 2016-10-21 2017-03-15 珠海市魅族科技有限公司 A kind of documents editing processing method and processing device
CN106453425A (en) * 2016-12-09 2017-02-22 郑州云海信息技术有限公司 Multiuser right management method and multiuser right management system for using host plugin
CN106991035A (en) * 2017-04-06 2017-07-28 北京计算机技术及应用研究所 A kind of Host Supervision System based on micro services framework
CN111625854A (en) * 2020-05-25 2020-09-04 聚好看科技股份有限公司 Document encryption method, access method, server and system
CN111625854B (en) * 2020-05-25 2022-10-14 聚好看科技股份有限公司 Document encryption method, access method, server and system

Also Published As

Publication number Publication date
US20070226488A1 (en) 2007-09-27
CN101043319B (en) 2011-02-02

Similar Documents

Publication Publication Date Title
CN101043319B (en) Digital content protective system and method
US8458273B2 (en) Content rights management for document contents and systems, structures, and methods therefor
US8595488B2 (en) Apparatus, system and method for securing digital documents in a digital appliance
US7512798B2 (en) Organization-based content rights management and systems, structures, and methods therefor
Liu et al. Digital rights management for content distribution
US8909924B2 (en) Digital asset management system
US7392547B2 (en) Organization-based content rights management and systems, structures, and methods therefor
EP1686504B1 (en) Flexible licensing architecture in content rights management systems
US20040039932A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
US7549062B2 (en) Organization-based content rights management and systems, structures, and methods therefor
US20110185179A1 (en) System And Method For Digital Rights Management With A Lightweight Digital Watermarking Component
US20030051172A1 (en) Method and system for protecting digital objects distributed over a network
KR20040002771A (en) Systems and methods for providing secure server key operations
US8972747B2 (en) Managing information in a document serialization
Foltz et al. Simplified key management for digital access control of information objects
Conrado et al. Controlled sharing of personal content using digital rights management
Simpson et al. Electronic Record Key Management for Digital Rights Management
Taft et al. The application/pdf media type
Arsenova Technical aspects of digital rights management
CN111385097A (en) Method and storage medium for data signature authentication
Jonker et al. Core security requirements of DRM systems
Chen et al. An Approach of Digital Rights Management for E-Museum with Enforce Context Constraints in RBAC Environments
Wang et al. Notice of Retraction: Research on digital content copyright protection system
CN111639305A (en) Block chain-based content copyright protection method and system
JP2003196159A (en) Information delivery method and device for preventing illicit use of information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110202

Termination date: 20150322

EXPY Termination of patent right or utility model